Sciweavers

519 search results - page 48 / 104
» Comparing Instance Generation Methods for Automated Reasonin...
Sort
View
ESORICS
2002
Springer
16 years 3 days ago
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
Abstract. An important goal of security in information systems is confidentiality. A confidentiality policy specifies which users should be forbidden to acquire what kind of inform...
Joachim Biskup, Piero A. Bonatti
86
Voted
CIKM
2009
Springer
15 years 4 months ago
Generating SQL/XML query and update statements
The XML support in relational databases and the SQL/XML language are still relatively new as compared to purely relational databases and traditional SQL. Today, most database user...
Matthias Nicola, Tim Kiefer
FMICS
2006
Springer
15 years 4 months ago
SAT-Based Verification of LTL Formulas
Abstract. Bounded model checking (BMC) based on satisfiability testing (SAT) has been introduced as a complementary technique to BDDbased symbolic model checking of LTL properties ...
Wenhui Zhang
94
Voted
DATE
2008
IEEE
122views Hardware» more  DATE 2008»
15 years 7 months ago
Simulation-Directed Invariant Mining for Software Verification
With the advance of SAT solvers, transforming a software program to a propositional formula has generated much interest for bounded model checking of software in recent years. How...
Xueqi Cheng, Michael S. Hsiao
118
Voted
WCRE
2008
IEEE
15 years 7 months ago
Reverse Engineering CAPTCHAs
CAPTCHAs are automated Turing tests used to determine if the end-user is human and not an automated program. Users are asked to read and answer Visual CAPTCHAs, which often appear...
Abram Hindle, Michael W. Godfrey, Richard C. Holt